Engineering Sciences/NOLTA-Information Security(Date:1997/11/20)

Presentation
表紙

,  

[Date]1997/11/20
[Paper #]
目次

,  

[Date]1997/11/20
[Paper #]
Cryptographic Library Architecture for Secure Application Development

Hirosato TSUJI,  Kazumi SAITO,  Hiroyuki SAKAKIBARA,  Takeshi YONEDA,  

[Date]1997/11/20
[Paper #]ISEC97-47
Modular Inverse Algorithm Optimized by Initial Operations

Tetsutaro Kobayashi,  Hikaru Morita,  

[Date]1997/11/20
[Paper #]ISEC97-48
On Smoothness of Numbers

Akira HAYASHI,  

[Date]1997/11/20
[Paper #]ISEC97-49
A study of integer factorization based on the CFRAC method

Qian Li,  Kunikatsu KOBAYASHI,  

[Date]1997/11/20
[Paper #]ISEC97-50
A Note on the No-Way Functions

Li Li,  Eikoh Chida,  Hiroki Shizuya,  

[Date]1997/11/20
[Paper #]ISEC97-51
How to Prove (Non-) Existence of a Key Word As a Substring in Encrypted Messages

Takako Ito,  Hiroki Shizuya,  

[Date]1997/11/20
[Paper #]ISEC97-52
[OTHERS]

,  

[Date]1997/11/20
[Paper #]